When any entity assess compliance with the security requirements of NIST SP 800-171, they must use:

Secret Private Quiz

Quiz
•
Other
•
Professional Development
•
Medium
ASHLEY TRIVITT
Used 18+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The NIST SP 800-171A procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-88 Revision 1 procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-53B procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-171 Revision 2 procedures to evaluate the effectiveness of the tested controls
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Certified Assessors will review information and evidence to independently verify that:
The contractor is aware of the objectives of the required practices
The contractor meets the stated assessment objectives for all the required practices
The contractor has implemented all the required controls
There is an action plan in place to implement all the required practices
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
PKI stands for:
Public Key Information
Public Key Infrastructure
Performance Key Indicator
Process Key Indicator
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The Property that preserves authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information is called:
Security
Privacy
Integrity
Confidentiality
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The application of an assessment procedure to a security requirement produces:
Assessment findings
All of these
Risk Mitigations
Remediation Plans
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security functions include:
Employee vetting
Establishing System Accounts
Performance Review
Communication with regulators
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
To document implementation of NIST SP 800-171, the contractor must develop, document, and periodically update a system security plan that describes:
All of these
System environments of operation
How security requirements are implemented
System boundaries
Create a free account and access millions of resources
Similar Resources on Quizizz
45 questions
HEART Customer Service Quiz

Quiz
•
Professional Development
46 questions
Test Your Knowledge_AS_New_EN

Quiz
•
Professional Development
50 questions
LIB Test C

Quiz
•
Professional Development
50 questions
WKF Kata Test 1

Quiz
•
Professional Development
54 questions
Central Heating L2 6035 Plumbing

Quiz
•
Professional Development
55 questions
Mixed Review - Ch 7-8-9

Quiz
•
University - Professi...
45 questions
Mock Paper 1 (2023)

Quiz
•
Professional Development
55 questions
TFN MIDTERM REVIEWER (THEORISTS)

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade